Tag: theft
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft, where criminals combine real and fabricated data to create entirely new “people”, is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations… First seen…
-
Data Theft Hits Behavioral Health Network in 3 States
Oglethorpe Notifying 92,000 Patients of June Hack of Mental Health, Addiction Info. A Florida-based firm that operates in-patient mental health and addiction recovery treatment facilities in three states is notifying more than 92,000 patients that their personal and sensitive health information may have been compromised in a data theft hack discovered in June. First seen…
-
Cargo theft gets a boost from hackers using remote monitoring tools
Cybersecurity researchers have been tracking thieves who are using their deep knowledge of trucking and transportation technology to steal cargo. First seen on therecord.media Jump to article: therecord.media/cargo-theft-hackers-remote-monitoring-tools
-
Cybercrime groups team with organized crime in massive cargo theft campaigns
Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cybercrime-organized-crime-cargo-theft-campaign/804501/
-
Hackers Help Organized Crime Groups in Cargo Freight Heists, Researchers Find
Proofpoint researchers have observed recent hacking campaigns supporting cargo theft First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hackers-organized-crime-cargo/
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Standing to Sue The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how U.S. courts still undervalue privacy in the digital age, and why the elephant in the…
-
Court Finalizes HCA Data Breach Class Action Settlement
Multimillion Dollar Deal Resolves 27 Lawsuits After 2023 Email Storage Hack. A Tennessee federal court has approved a multimillion dollar settlement in consolidated class action litigation against HCA Healthcare in the wake of a 2023 email data theft hack that the publicly traded company reported as affecting nearly 11.3 million individuals. First seen on govinfosecurity.com…
-
FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms
An FCC ruling issued days before Donald Trump took office was an “ineffective response” to the Salt Typhoon intrusions into U.S. telecom networks, the agency’s new leadership said in announcing plans to rescind it. First seen on therecord.media Jump to article: therecord.media/fcc-plans-vote-rescind-biden-era-ruling-telecoms-cyber
-
FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms
An FCC ruling issued days before Donald Trump took office was an “ineffective response” to the Salt Typhoon intrusions into U.S. telecom networks, the agency’s new leadership said in announcing plans to rescind it. First seen on therecord.media Jump to article: therecord.media/fcc-plans-vote-rescind-biden-era-ruling-telecoms-cyber
-
Typo hackers sneak cross-platform credential stealer into 10 npm packages
Payload for IP fingerprinting and credential theft: Once the fake CAPTCHA interaction occurs, the installer sends the victim’s IP address to the attacker’s server, a step that allows tracking, geofencing, and exclusion of unwanted targets.It then downloads the payload from the same host, which is a 24 MB Pyinstaller-packed application that contains hundreds of thousands…
-
Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker
An ex-L3 Harris executive pleaded guilty to two counts of theft of trade secrets Wednesday, admitting to selling eight zero-day exploits to a Russian broker in exchange for millions of dollars. Peter Williams, 39, pleaded guilty in the District Court of the District of Columbia to two counts of theft of trade secrets. Court records…
-
Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker
An ex-L3 Harris executive pleaded guilty to two counts of theft of trade secrets Wednesday, admitting to selling eight zero-day exploits to a Russian broker in exchange for millions of dollars. Peter Williams, 39, pleaded guilty in the District Court of the District of Columbia to two counts of theft of trade secrets. Court records…
-
New Atroposia RAT Surfaces on Dark Web
Atroposia is a newly discovered modular RAT that uses encrypted channels and advanced theft capabilities to target credentials and crypto wallets First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/new-atroposia-rat-surfaces-on-dark/
-
Notable post-quantum cryptography initiatives paving the way toward Q-Day
Tags: attack, awareness, cisa, cisco, communications, computer, computing, crypto, cryptography, cyber, cybersecurity, data, encryption, finance, framework, google, government, group, guide, ibm, infrastructure, intelligence, Internet, iot, linux, microsoft, mitre, ml, nist, nvidia, open-source, service, side-channel, software, supply-chain, technology, theft, threat, tool, vulnerabilityIndustry heavyweights line up behind PQC: Google”¯Chrome became the first mainstream browser to support hybrid post”‘quantum key exchanges by default late last year.The approach combines classical elliptic-curve encryption, for backwards compatibility, with lattice-based PQC derived from ML-KEM.Other industry giants, including Amazon and IBM, have also begun laying foundations for quantum-safe cryptography. For example, IBM has…
-
Notable post-quantum cryptography initiatives paving the way toward Q-Day
Tags: attack, awareness, cisa, cisco, communications, computer, computing, crypto, cryptography, cyber, cybersecurity, data, encryption, finance, framework, google, government, group, guide, ibm, infrastructure, intelligence, Internet, iot, linux, microsoft, mitre, ml, nist, nvidia, open-source, service, side-channel, software, supply-chain, technology, theft, threat, tool, vulnerabilityIndustry heavyweights line up behind PQC: Google”¯Chrome became the first mainstream browser to support hybrid post”‘quantum key exchanges by default late last year.The approach combines classical elliptic-curve encryption, for backwards compatibility, with lattice-based PQC derived from ML-KEM.Other industry giants, including Amazon and IBM, have also begun laying foundations for quantum-safe cryptography. For example, IBM has…
-
New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence
Tags: access, credentials, cyber, cyberattack, cybercrime, malware, marketplace, network, rat, theft, vulnerabilityA sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive toolkit for hidden remote desktop access, credential theft, and network manipulation at an accessible price point. Security researchers at Varonis recently discovered the malware being promoted on underground forums, highlighting how advanced cyberattack capabilities are increasingly packaged…
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
New Atroposia malware comes with a local vulnerability scanner
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion, data theft, and local vulnerability scanning. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
-
Back-Office Servicer Reports Data Theft Affects 10.5M
Humana, BCBS Montana Are Among Clients of Conduent Hack. Conduent Business Solutions LLC has told state regulators that a hacking incident discovered in January has affected more than 10.5 million patients. Clients affected include Blue Cross Blue Shield of Montana and Humana, as well as an undisclosed number of other organizations. First seen on govinfosecurity.com…
-
DomeWatch Leak Exposed Personal Data of Capitol Hill Applicants
Unsecured House Democrats’ resume bank (DomeWatch) exposed 7,000 records, including PII and “top secret” clearance status, raising identity theft fears. First seen on hackread.com Jump to article: hackread.com/domewatch-leak-capitol-hill-applicants-data/
-
New HyperRat Android Malware Sold as Ready-Made Spy Tool
Researchers have uncovered HyperRat, a new Android malware sold as a service, giving attackers remote control, data theft tools, and mass phishing features. First seen on hackread.com Jump to article: hackread.com/hyperrat-android-malware-sold-spy-tool/

